Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection Algorithms for Location Security in 5G Scenarios., , , , and . CoRR, (2021)Design and Experimental Assessment of Detection Schemes for Air Interface Attacks in Adverse Scenarios., , , , and . CoRR, (2021)From Experiments to Insights: A Journey in 5G New Radio Localization., , , , , , , and . MedComNet, page 74-82. IEEE, (2023)SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform., , , , , , , , , and 1 other author(s). Sensors, 22 (17): 6527 (2022)RAINSTORM: Reconnaissance SDR Platform1., , , , and . ICIN, page 36-38. IEEE, (2023)Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security., , , , and . IEEE Trans. Wirel. Commun., 22 (1): 205-219 (2023)Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments., , , , , and . Comput. Commun., (December 2023)IMSI Catchers in the wild: A real world 4G/5G assessment., , , and . Comput. Networks, (2021)Uncertainty Quantification of 5G Positioning as a Location Data Analytics Function., , , , , , , , and . EuCNC, page 255-260. IEEE, (2022)5G Positioning with SDR-based Open-source Platforms: Where do We Stand?, , , and . PEMWN, page 1-6. IEEE, (2022)